Business Confronts Terrorism: Risks and Responses

Editorial Reviews. About the Author. Dean C. Alexander serves as a consultant in the Business Confronts Terrorism: Risks and Responses - Kindle edition by Dean C. Alexander. Download it once and read it on your Kindle device, PC.
Table of contents

UK uses cookies to make the site simpler. Find out more about cookies. This publication is licensed under the terms of the Open Government Licence v3. To view this licence, visit nationalarchives. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. This publication is available at https: There is a serious and sustained threat from both international and Irish-related terrorism to the UK and UK interests overseas.

Risks and Responses

The most significant terrorist threat comes from international terrorism. As a number of recent European attacks have showed, attacks may be mounted without warning. Northern Ireland-related terrorism continues to pose a threat. They still aspire to mount attacks within the UK mainland and have conducted attacks within Northern Ireland.


  1. Business Confronts Terrorism: Risks and Responses - download pdf or read online.
  2. Citation Styles for "Business confronts terrorism : risks and responses"?
  3. Best Friend:A collection of poems for the young at heart to be illustrated by the reader.
  4. Business Confronts Terrorism.
  5. Sealskin.
  6. Enveloped in Light: A Tallit Sourcebook?

Firearms and Weapons attacks are rare in the UK. Call - What do the police need to know? If you cannot speak or make a noise listen to the instructions given to you by the call taker. Building on Run, Hide Tell, this helps people understand what to do in the event of an attack.

Establishing stability, ensuring safety, focusing on recovery

If the item is assessed to be unattended rather than suspicious, examine further before applying lost property procedures However, if H-O-T leads you to believe the item is suspicious, apply the 4Cs. Most businesses will receive a large amount of mail and other deliveries which offers a potentially attractive route into premises for terrorists. A properly conducted risk assessment should give you a good idea of the likely threat to your organisation and indicate precautions you need to take. Delivered items which includes letters, parcels, packages, and anything delivered by post or courier, have been a commonly used tactic by criminals and terrorists.

Delivered items may be explosive, incendiary, contain sharps, blades or chemical, biological or radiological CBR material. Be aware that such materials may not be white and may not be powders. Anyone receiving a suspicious delivery is unlikely to know which type it is, so procedures should cater for every eventuality. Threat items come in a variety of shapes and sizes; a well-made device will look innocuous, but there may be tell-tale signs. A delivered item may have received some rough handling in the post and so is unlikely to detonate through being moved.

Any attempt at opening it, may set it off or release the contents. Additional explosive or incendiary indicators include:. Though the precise nature of the incident may not be immediately apparent the first step will be recognition that an incident has occurred, such as through the indicators described above. The response procedure will follow including communication with the emergency services, who will provide the appropriate response. Ensuring that the appropriate staff are familiar with your response procedure is key to its successful implementation.

However the provision of materials to undertake improvised decontamination, such as absorbent materials and water, in a suitable location, such as where you would likely evacuate contaminated staff to, may be appropriate. A risk assessment is fundamental to ensuring that any measures or procedures your organisation implements are proportional to the risk it faces.

There are a number of physical protective measures, including blast protection, dedicated HVAC systems, specialist filtration, washing and shower facilities, that can be used to protect your organisation and those undertaking mail screening. These should be proportionate to the level of screening needed, but you should consider the highest anticipated level of screening that may be required, as physical protective measures may be challenging to alter in response to any change in threat.

Although not all suspicious items will be hazardous or malicious, you may not be able to determine this without support from the emergency services.

Recognising the terrorist threat

Therefore communication with the emergency services is important in triggering the appropriate response, as highlighted above. Your local police [Counter Terrorism Security Advisor CTSA can assist with this process by providing information to support threat and impact assessments, as well as relevant mitigation measures.

You could discover a suspicious item in a mail room, or anywhere else in the building - ensure you have appropriate emergency response plans in place. Further advice on screening mail and courier deliveries. The vast majority of bomb threats are hoaxes designed to cause alarm and disruption.

As well as the rare instances of valid bomb threats, terrorists may also make hoax bomb threat calls to intimidate the public, businesses and communities, to draw attention to their cause and to mislead police. While many bomb threats involve a person-to-person phone call, an increasing number are sent electronically using email or social media applications.

In this Book

No matter how ridiculous or implausible the threat may seem, all such communications are a crime and should be reported to the police by dialling It is important that potential recipients - either victims or third-parties used to pass the message - have plans that include how the information is recorded, acted upon and passed to police. Bomb threats containing accurate and precise information, and received well in advance of an actual attack, are rare occurrences.

Precise motives for hoaxing are difficult to determine but may include revenge, extortion, a desire to impress, or a combination of these and other less understandable motives. A bomb threat can be communicated in a number of different ways. The threat is likely to be made in person over the telephone; however, it may also be a recorded message, communicated in written form, delivered face-to-face or, increasingly, sent by email or social media e.

Twitter or Instagram, etc. A threat may be communicated via a third-party, i.


  • The Wild Life: A Year of Living on Wild Food?
  • An Evil Shadow - A Val Bosanquet Mystery (The Val Bosanquet Mysteries Book 1).
  • The Little Book of the Great Enchantment.
  • .
  • .
  • British Foreign Policy 1874-1914: The Role of India (Routledge Studies in Modern European History).
  • !
  • Any member of staff with a direct telephone line, mobile phone, computer or tablet etc. Such staff should, therefore, understand the actions required of them as the potential first response to a threat message.

    Evaluating the credibility of a threat is a critical task, particularly if the attack being threatened is imminent. This is a tactic used to place additional pressure on decision makers. Police will assess the threat at the earliest opportunity. When specific intelligence is known to police, advice will be issued accordingly; however, in the absence of detailed information, it will be necessary to consider a number of factors: Responsibility for the initial decision making remains with the management of the location being threatened.

    Do not delay your decision making process waiting for the arrival of police. Police will assess the credibility of the threat at the earliest opportunity. All bomb threats should be reported to the police and their subsequent advice followed accordingly. It is essential that appropriate plans exist, they should be event and location specific. Venue options to manage the risk include: It is important to appoint people, familiar with evacuation points and assembly rendezvous points, to act as marshals and assist with this procedure.

    At least two assembly points should be identified in opposing directions, and at least metres from the suspicious item, incident or location. Where possible the assembly point should not be a car park. You may wish to seek specialist advice, which can help to identify suitable assembly points and alternative options as part of your planning. It is essential that evacuation plans exist; they should be event and location specific. Evacuation procedures should also put adequate steps in place to ensure no one else enters the area once an evacuation has been initiated.

    The police will establish cordons depending upon the size of an identified suspect device. Always follow police directions and avoid assembly close to a police cordon. There are occasions when it is safer to remain inside. If the suspect device is outside your venue, people may be exposed to greater danger if the evacuation route inadvertently takes them past the device. A safer alternative may be the use of internal protected spaces.

    Project MUSE - Business Confronts Terrorism

    This type of inwards evacuation needs significant pre-planning and may benefit from expert advice to help identify an internal safe area within your building. These locations should be in your plans. If the location of the device threatened is unknown, evacuation represents a credible and justifiable course of action. This will be reasonable and proportionate if, after an evaluation by the relevant manager s , the threat is deemed implausible e. In such circumstances police may provide additional advice and guidance relating to other risk management options.

    It may be considered desirable to ask staff familiar with the venue to check their immediate surroundings to identify anything out of place, see search considerations below. Regular searches of your establishment, proportionate to the risks faced, will enhance a good security culture and reduce the risk of a suspicious item being placed or remaining unnoticed for long periods. Disabled staff should have personal evacuation plans and be individually briefed on their evacuation procedures. Similarly all visitors should be briefed on evacuation procedures and quickly identified and assisted in the event of a threat.

    Avoid revealing details about specific incidents to the media or through social media without prior consultation with police. Do not provide details of the threat, the decision making process relating to evacuation internal or external or why a decision not to evacuate was taken. VBIEDs can be highly destructive. Not only can the bomb blast be lethal, but flying debris, such as glass, can present a hazard.

    VBIEDs can carry a large quantity of explosives to a target and cause a great deal of damage. Recognising that there were many people in need of help, both expatriates and locals, the client authorised us to assist dozens of expat and local civilians our operatives encountered along the way. This Control Risks report analyses global incidents of war, terrorism, unrest and crime with commercial relevance by country, region, targets and tactics. Organisations are facing an increasingly complex security challenge, but they have a number of responses available to them.

    This website uses anonymous cookies to improve your experience of our website Read more. Terrorism and Security Incident Response Establishing stability, ensuring safety, focusing on recovery. Incident response co-ordination The essence of the Control Risks response — honed over decades of front-line crisis management — is to establish perspective on a situation, create a stable decision-making platform and deploy whatever expertise is needed to make your workforce safe.

    Mobile workforce security Through our alliance with International SOS, we bring a coordinated security and medical response to any incident, wherever in the world it occurs. Executive protection Our executive protection operatives are located around the world, know their environments and are formally trained and licensed to Security Industry Authority SIA standards or equivalent. Find out more Can our experts help you? Read More link icon. We are pleased to release our second quarter report on political violence and violent organised crime incidents around the world.

    Kourdi evaluates the instruments, strategies, and methods for making profit-boosting judgements. Read e-book online Value Driven Management: Rather than focusing exclusively on earnings or shareholder wealth, price pushed administration is aimed toward growing and maintaining worth over the years - via spotting and utilizing "value drivers" to steer management, administration and decision-making. Download PDF by P. Project Appraisal and Valuation of the Enviornment: It combines theoretical rigour with utilized financial talents, provided with strong logic. Additional interest in organic food—beef and milk products in particular—was another consequence of the mad cow scare.

    It is worthy to note that terror groups have already undertaken attacks against food supplies actions in the past: Tamil Tigers attacking the Sri Lankan tea crop; and Palestinian terror groups injecting mercury into Israeli citrus products. Several car bombs exploded outside the local headquarters in Baghdad of the International Committee of the Red Cross, killing at least 35 people and injuring over persons.

    A suicide truck bomber killed 29 and injured nearly when he rammed the Italian military headquarters in Nasiriyah.